期刊文献+
共找到11,305篇文章
< 1 2 250 >
每页显示 20 50 100
ZeroDefense:An adaptive hybrid fusion-based intrusion detection system for zero-day threat detection in IoT networks
1
作者 Abubakar Wakili Sara Bakkali 《Journal of Electronic Science and Technology》 2026年第1期29-45,共17页
Zero-day attacks present a critical cybersecurity challenge for Internet of things(IoT)infrastructures,where the inability of signature-based intrusion detection systems(IDSs)to recognize novel threat behaviors compro... Zero-day attacks present a critical cybersecurity challenge for Internet of things(IoT)infrastructures,where the inability of signature-based intrusion detection systems(IDSs)to recognize novel threat behaviors compromises both system reliability and operational continuity.Existing hybrid IDS solutions often struggle to balance accurate classification of known attacks with reliable anomaly detection,particularly under the computational constraints of IoT environments.To address this gap,we introduce ZeroDefense,an adaptive fusion-based IDS designed for simultaneous detection of known intrusions and emerging zero-day threats.The framework employs a four-layer architecture consisting of i)feature standardization and class balancing,ii)anomaly detection using isolation forest,autoencoder,and local outlier factor,iii)fine-grained attack classification via random forest,extreme gradient boosting(XGBoost),light gradient boosting machine(LightGBM),and attentive interpretable tabular learning(TabNet),and iv)a confidence-aware fusion engine that adaptively selects the most reliable decision path.Suspicious or previously unseen traffic is isolated early through fused anomaly scoring,while benign and known-malicious flows are processed through supervised classification for precise attack labeling.With an anomaly cascaded decision pipeline,a dynamic confidence-driven fusion mechanism,and a deploymentconscious design,ZeroDefense enables real-time inference on IoT edge gateways.Evaluation on the CICIoT2023 benchmark demonstrates 99.94% overall accuracy and 95.64%macro-average F1-score for known attacks,while 5.76% of traffic is successfully flagged as potential zero-day activity,with inference latency maintained below 100 ms/flow.These results indicate that ZeroDefense offers a scalable,resilient,and practically deployable defense capability for modern IoT infrastructures. 展开更多
关键词 Anomaly detection Hybrid fusion Internet of things(IoT) Intrusion detection system IoT security Resilient digital infrastructure Zero-day detection
在线阅读 下载PDF
GSLDWOA: A Feature Selection Algorithm for Intrusion Detection Systems in IIoT
2
作者 Wanwei Huang Huicong Yu +3 位作者 Jiawei Ren Kun Wang Yanbu Guo Lifeng Jin 《Computers, Materials & Continua》 2026年第1期2006-2029,共24页
Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from... Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy.This paper proposes an industrial Internet ofThings intrusion detection feature selection algorithm based on an improved whale optimization algorithm(GSLDWOA).The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to,such as local optimality,long detection time,and reduced accuracy.First,the initial population’s diversity is increased using the Gaussian Mutation mechanism.Then,Non-linear Shrinking Factor balances global exploration and local development,avoiding premature convergence.Lastly,Variable-step Levy Flight operator and Dynamic Differential Evolution strategy are introduced to improve the algorithm’s search efficiency and convergence accuracy in highdimensional feature space.Experiments on the NSL-KDD and WUSTL-IIoT-2021 datasets demonstrate that the feature subset selected by GSLDWOA significantly improves detection performance.Compared to the traditional WOA algorithm,the detection rate and F1-score increased by 3.68%and 4.12%.On the WUSTL-IIoT-2021 dataset,accuracy,recall,and F1-score all exceed 99.9%. 展开更多
关键词 Industrial Internet of Things intrusion detection system feature selection whale optimization algorithm Gaussian mutation
在线阅读 下载PDF
Enhancing Intrusion Detection Systems Using Hybrid AI-Based Approaches
3
作者 Mohammad Alshinwan Radwan M.Batyha +5 位作者 Walaa Alayed Saad Said Alqahtany Suhaila Abuowaida Hamza A.Mashagba Azlan B.Abd Aziz Samir Salem Al-Bawri 《Computers, Materials & Continua》 2026年第5期2208-2245,共38页
Safeguarding modern networks from cyber intrusions has become increasingly challenging as attackers continually refine their evasion tactics.Although numerousmachine-learning-based intrusion detection systems(IDS)have... Safeguarding modern networks from cyber intrusions has become increasingly challenging as attackers continually refine their evasion tactics.Although numerousmachine-learning-based intrusion detection systems(IDS)have been developed,their effectiveness is often constrained by high dimensionality and redundant features that degrade both accuracy and efficiency.This study introduces a hybrid feature-selection framework that integrates the exploration capability of Prairie Dog Optimization(PDO)with the exploitation behavior of Ant Colony Optimization(ACO).The proposed PDO–ACO algorithm identifies a concise yet discriminative subset of features from the NSLKDD dataset and evaluates them using a Support Vector Machine(SVM)classifier.Experimental analyses reveal that the PDO–ACO model achieves superior detection accuracy of 98%while significantly lowering false alarms and computational overhead.Further validation on the CEC2017 benchmark suite confirms the robustness and adaptability of the hybrid model across diverse optimization landscapes,positioning PDO–ACO as an efficient and scalable approach for intelligent intrusion detection. 展开更多
关键词 Intrusion detection system prairie dog optimization artificial bee colony support vector machine
在线阅读 下载PDF
A generation-based defect detection system for rail transit infrastructure
4
作者 Xinyu Zheng Lingfeng Zhang +1 位作者 Yuhao Luo Tiange Wang 《High-Speed Railway》 2026年第1期1-9,共9页
The use of Unmanned Aerial Vehicles(UAVs)for defect detection on railway slopes is becoming increasingly widespread due to their ability to capture high-resolution images over large,inaccessible,and topographically co... The use of Unmanned Aerial Vehicles(UAVs)for defect detection on railway slopes is becoming increasingly widespread due to their ability to capture high-resolution images over large,inaccessible,and topographically complex areas.However,current UAV-based detection methods face several critical limitations,including constrained deployment frequency,limited availability of annotated defect data,and the lack of mature risk assessment frameworks.To address these challenges,this study introduces a novel approach that integrates diffusion models with Large Language Models(LLMs)to generate highquality synthetic defect images tailored to railway slope scenarios.Furthermore,an improved transformerbased architecture is proposed,incorporating attention mechanisms and LLM-guided diffusion-generated imagery to enhance defect recognition performance under complex environmental conditions.Experimental evaluations conducted on a dataset of 300 field-collected images from high-risk railway slopes demonstrate that the proposed method significantly outperforms existing baselines in terms of precision,recall,and robustness,indicating strong applicability for real-world railway infrastructure monitoring and disaster prevention. 展开更多
关键词 RAILWAY Large language models Computer vision Object detection
在线阅读 下载PDF
Intrusion Detection Systems in Industrial Control Systems:Landscape,Challenges and Opportunities
5
作者 Tong Wu Dawei Zhou +1 位作者 Qingyu Ou Fang Luo 《Computers, Materials & Continua》 2026年第3期162-200,共39页
The increasing interconnection of modern industrial control systems(ICSs)with the Internet has enhanced operational efficiency,but alsomade these systemsmore vulnerable to cyberattacks.This heightened exposure has dri... The increasing interconnection of modern industrial control systems(ICSs)with the Internet has enhanced operational efficiency,but alsomade these systemsmore vulnerable to cyberattacks.This heightened exposure has driven a growing need for robust ICS security measures.Among the key defences,intrusion detection technology is critical in identifying threats to ICS networks.This paper provides an overview of the distinctive characteristics of ICS network security,highlighting standard attack methods.It then examines various intrusion detection methods,including those based on misuse detection,anomaly detection,machine learning,and specialised requirements.This paper concludes by exploring future directions for developing intrusion detection systems to advance research and ensure the continued security and reliability of ICS operations. 展开更多
关键词 Industrial control system industrial control system network security intrusion detection cyberspace security ICS network network security
在线阅读 下载PDF
EDESC-IDS:An Efficient Deep Embedded Subspace Clustering-Based Intrusion Detection System for the Internet of Vehicles
6
作者 Lixing Tan Liusiyu Chen +2 位作者 Yang Wang Zhenyu Song Zenan Lu 《Computers, Materials & Continua》 2026年第5期997-1020,共24页
Anomaly detection is a vibrant research direction in controller area networks,which provides the fundamental real-time data transmission underpinning in-vehicle data interaction for the internet of vehicles.However,ex... Anomaly detection is a vibrant research direction in controller area networks,which provides the fundamental real-time data transmission underpinning in-vehicle data interaction for the internet of vehicles.However,existing unsupervised learning methods suffer from insufficient temporal and spatial constraints on shallow features,resulting in fragmented feature representations that compromise model stability and accuracy.To improve the extraction of valuable features,this paper investigates the influence of clustering constraints on shallow feature convergence paths at the model level and further proposes an end-to-end intrusion detection system based on efficient deep embedded subspace clustering(EDESC-IDS).Following the standard learning approach,continuous messages are encoded into two-dimensional data frames via a frame builder,which are then input into an extended convolutional autoencoder for extracting shallow features from high-dimensional data.On this basis,the dual constraints of these output features and the embedding clustering module facilitate end-to-end training of the EDESC-IDS in various attack scenarios.Extensive experimental results show that such a system exhibits significant detection performance on four types of attack datasets,including DoS,Gear,Fuzzy,and RPM,with precision,recall,and F1 scores consistently above 97.79%,while maintaining a false negative rate(FNR)and an error rate(ER)below 2.22%. 展开更多
关键词 Internet of vehicles control area network anomaly detection unsupervised learning deep embedded subspace clustering extended convolutional autoencoder
在线阅读 下载PDF
Drone-based superconducting nanowire single-photon detection system with a detection efficiency of more than 90% 被引量:2
7
作者 Ruoyan Ma Zhimin Guo +11 位作者 Dai Chen Xiaojun Dai You Xiao Chengjun Zhang Jiamin Xiong Jia Huang Xingyu Zhang Xiaoyu Liu Liangliang Rong Hao Li Xiaofu Zhang Lixing You 《Advanced Photonics Nexus》 2025年第2期25-30,共6页
Conventional superconducting nanowire single-photon detectors(SNSPDs)have been typically limited in their applications due to their size,weight,and power consumption,which confine their use to laboratory settings.Howe... Conventional superconducting nanowire single-photon detectors(SNSPDs)have been typically limited in their applications due to their size,weight,and power consumption,which confine their use to laboratory settings.However,with the rapid development of remote imaging,sensing technologies,and long-range quantum communication with fewer topographical constraints,the demand for high-efficiency single-photon detectors integrated with avionic platforms is rapidly growing.We herein designed and manufactured the first drone-based SNSPD system with a system detection efficiency(SDE)as high as 91.8%.This drone-based system incorporates high-performance NbTiN SNSPDs,a self-developed miniature liquid helium dewar,and custom-built integrated electrical setups,making it capable of being launched in complex topographical conditions.Such a drone-based SNSPD system may open the use of SNSPDs for applications that demand high SDE in complex environments. 展开更多
关键词 superconducting nanowire single-photon detector drone-based single-photon detection system high system detection efficiency dark count rate
在线阅读 下载PDF
An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment
8
作者 Tarak Dhaouadi Hichem Mrabet +1 位作者 Adeeb Alhomoud Abderrazak Jemai 《Computers, Materials & Continua》 2025年第3期4535-4554,共20页
The increasing adoption of Industrial Internet of Things(IIoT)systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems(IDS)to be effective.How... The increasing adoption of Industrial Internet of Things(IIoT)systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems(IDS)to be effective.However,existing datasets for IDS training often lack relevance to modern IIoT environments,limiting their applicability for research and development.To address the latter gap,this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems.As a consequence,that can be used by an IDS to detect imminent threats.Likewise,HiTar-2024 was generated using the AREZZO simulator,which replicates realistic smart manufacturing scenarios.The generated dataset includes five distinct classes:Normal,Probing,Remote to Local(R2L),User to Root(U2R),and Denial of Service(DoS).Furthermore,comprehensive experiments with popular Machine Learning(ML)models using various classifiers,including BayesNet,Logistic,IBK,Multiclass,PART,and J48 demonstrate high accuracy,precision,recall,and F1-scores,exceeding 0.99 across all ML metrics.The latter result is reached thanks to the rigorous applied process to achieve this quite good result,including data pre-processing,features extraction,fixing the class imbalance problem,and using a test option for model robustness.This comprehensive approach emphasizes meticulous dataset construction through a complete dataset generation process,a careful labelling algorithm,and a sophisticated evaluation method,providing valuable insights to reinforce IIoT system security.Finally,the HiTar-2024 dataset is compared with other similar datasets in the literature,considering several factors such as data format,feature extraction tools,number of features,attack categories,number of instances,and ML metrics. 展开更多
关键词 Intrusion detection system industrial IoT machine learning security cyber-attacks DATASET
在线阅读 下载PDF
Design and test of cesium atomic concentration detection system based on TDLAS
9
作者 LIANG Lizhen LIU Shanhu +2 位作者 WU Yong WEI Jianglong XIE Yahong 《Optoelectronics Letters》 2025年第3期167-171,共5页
In order to better build the neutral beam injector with negative ion source(NNBI),the pre-research on key technologies has been carried out for the comprehensive research facility for fusion technology(CRFFT).Cesium s... In order to better build the neutral beam injector with negative ion source(NNBI),the pre-research on key technologies has been carried out for the comprehensive research facility for fusion technology(CRFFT).Cesium seeding into negative-ion sources is a prerequisite to obtain the required negative hydrogen ion.The performance of ion source largely depends on the cesium conditions in the source.It is very necessary to quantitatively measure the amount of cesium in the source during the plasma on and off periods(vacuum stage). 展开更多
关键词 atomic concentration tdlas CESIUM detection system ion source negative hydrogen ionthe negative ion source nnbi neutral beam injector
原文传递
Enhancing Roaming Security in Cloud-Native 5G Core Network through Deep Learning-Based Intrusion Detection System
10
作者 I Wayan Adi Juliawan Pawana Vincent Abella +2 位作者 Jhury Kevin Lastre Yongho Ko Ilsun You 《Computer Modeling in Engineering & Sciences》 2025年第11期2733-2760,共28页
Roaming in 5G networks enables seamless global mobility but also introduces significant security risks due to legacy protocol dependencies,uneven Security Edge Protection Proxy(SEPP)deployment,and the dynamic nature o... Roaming in 5G networks enables seamless global mobility but also introduces significant security risks due to legacy protocol dependencies,uneven Security Edge Protection Proxy(SEPP)deployment,and the dynamic nature of inter-Public Land Mobile Network(inter-PLMN)signaling.Traditional rule-based defenses are inadequate for protecting cloud-native 5G core networks,particularly as roaming expands into enterprise and Internet of Things(IoT)domains.This work addresses these challenges by designing a scalable 5G Standalone testbed,generating the first intrusion detection dataset specifically tailored to roaming threats,and proposing a deep learning based intrusion detection framework for cloud-native environments.Six deep learning models including Multilayer Perceptron(MLP),one-dimensional Convolutional Neural Network(1D CNN),Autoencoder(AE),Recurrent Neural Network(RNN),Gated Recurrent Unit(GRU),and Long Short-Term Memory(LSTM)were evaluated on the dataset using both weighted and balanced metrics to account for strong class imbalance.While all models achieved over 99%accuracy,recurrent architectures such as GRU and LSTM outperformed others in balanced accuracy and macro-level evaluation,demonstrating superior effectiveness in detecting rare but high-impact attacks.These results confirm the importance of sequence-aware Artificial Intelligence(AI)models for securing roaming scenarios,where transient and contextdependent threats are common.The proposed framework provides a foundation for intelligent,adaptive intrusion detection in 5G and offers a path toward resilient security in Beyond 5G and 6G networks. 展开更多
关键词 ROAMING 5G cloud native intrusion detection system deep learning
在线阅读 下载PDF
TIDS: Tensor Based Intrusion Detection System (IDS) and Its Application in Large Scale DDoS Attack Detection
11
作者 Hanqing Sun Xue Li +1 位作者 Qiyuan Fan Puming Wang 《Computers, Materials & Continua》 2025年第7期1659-1679,共21页
The era of big data brings new challenges for information network systems(INS),simultaneously offering unprecedented opportunities for advancing intelligent intrusion detection systems.In this work,we propose a data-d... The era of big data brings new challenges for information network systems(INS),simultaneously offering unprecedented opportunities for advancing intelligent intrusion detection systems.In this work,we propose a data-driven intrusion detection system for Distributed Denial of Service(DDoS)attack detection.The system focuses on intrusion detection from a big data perceptive.As intelligent information processing methods,big data and artificial intelligence have been widely used in information systems.The INS system is an important information system in cyberspace.In advanced INS systems,the network architectures have become more complex.And the smart devices in INS systems collect a large scale of network data.How to improve the performance of a complex intrusion detection system with big data and artificial intelligence is a big challenge.To address the problem,we design a novel intrusion detection system(IDS)from a big data perspective.The IDS system uses tensors to represent large-scale and complex multi-source network data in a unified tensor.Then,a novel tensor decomposition(TD)method is developed to complete big data mining.The TD method seamlessly collaborates with the XGBoost(eXtreme Gradient Boosting)method to complete the intrusion detection.To verify the proposed IDS system,a series of experiments is conducted on two real network datasets.The results revealed that the proposed IDS system attained an impressive accuracy rate over 98%.Additionally,by altering the scale of the datasets,the proposed IDS system still maintains excellent detection performance,which demonstrates the proposed IDS system’s robustness. 展开更多
关键词 Intrusion detection system big data tensor decomposition multi-modal feature DDOS
在线阅读 下载PDF
An Effective Intrusion Detection System Based on the FSA-BGRU Hybrid Model
12
作者 Deng Zaihui Li Zihang +2 位作者 Guo Jianzhong Gan Guangming Kong Dejin 《China Communications》 2025年第2期188-198,共11页
Intrusion detection systems play a vital role in cyberspace security.In this study,a network intrusion detection method based on the feature selection algorithm(FSA)and a deep learning model is developed using a fusio... Intrusion detection systems play a vital role in cyberspace security.In this study,a network intrusion detection method based on the feature selection algorithm(FSA)and a deep learning model is developed using a fusion of a recursive feature elimination(RFE)algorithm and a bidirectional gated recurrent unit(BGRU).Particularly,the RFE algorithm is employed to select features from high-dimensional data to reduce weak correlations between features and remove redundant features in the numerical feature space.Then,a neural network that combines the BGRU and multilayer perceptron(MLP)is adopted to extract deep intrusion behavior features.Finally,a support vector machine(SVM)classifier is used to classify intrusion behaviors.The proposed model is verified by experiments on the NSL-KDD dataset.The results indicate that the proposed model achieves a 90.25%accuracy and a 97.51%detection rate in binary classification and outperforms other machine learning and deep learning models in intrusion classification.The proposed method can provide new insight into network intrusion detection. 展开更多
关键词 bidirectional GRU feature selection intrusion detection system multilayer perceptron recursive feature elimination support vector machine
在线阅读 下载PDF
A Genetic Algorithm-Based Double Auction Framework for Secure and Scalable Resource Allocation in Cloud-Integrated Intrusion Detection Systems
13
作者 Siraj Un Muneer Ihsan Ullah +1 位作者 Zeshan Iqbal Rajermani Thinakaran 《Computers, Materials & Continua》 2025年第12期4959-4975,共17页
The complexity of cloud environments challenges secure resource management,especially for intrusion detection systems(IDS).Existing strategies struggle to balance efficiency,cost fairness,and threat resilience.This pa... The complexity of cloud environments challenges secure resource management,especially for intrusion detection systems(IDS).Existing strategies struggle to balance efficiency,cost fairness,and threat resilience.This paper proposes an innovative approach to managing cloud resources through the integration of a genetic algorithm(GA)with a“double auction”method.This approach seeks to enhance security and efficiency by aligning buyers and sellers within an intelligent market framework.It guarantees equitable pricing while utilizing resources efficiently and optimizing advantages for all stakeholders.The GA functions as an intelligent search mechanism that identifies optimal combinations of bids from users and suppliers,addressing issues arising from the intricacies of cloud systems.Analyses proved that our method surpasses previous strategies,particularly in terms of price accuracy,speed,and the capacity to manage large-scale activities,critical factors for real-time cybersecurity systems,such as IDS.Our research integrates artificial intelligence-inspired evolutionary algorithms with market-driven methods to develop intelligent resource management systems that are secure,scalable,and adaptable to evolving risks,such as process innovation. 展开更多
关键词 Cloud computing combinatorial double auction genetic algorithm optimization resource allocation intrusion detection system(IDS) cloud security
在线阅读 下载PDF
The Application of Machine Vision in Defect Detection Systems
14
作者 Peihang Zhong Jiawei Lin Muling Wang 《Journal of Electronic Research and Application》 2025年第2期191-196,共6页
With the rapid development of computer vision technology,artificial intelligence algorithms,and high-performance computing platforms,machine vision technology has gradually shown its great potential in automated produ... With the rapid development of computer vision technology,artificial intelligence algorithms,and high-performance computing platforms,machine vision technology has gradually shown its great potential in automated production lines,especially in defect detection.Machine vision technology can be applied in many industries such as semiconductor,automobile manufacturing,aerospace,food,and drugs,which can significantly improve detection efficiency and accuracy,reduce labor costs,improve product quality,enhance market competitiveness,and provide strong support for the arrival of Industry 4.0 era.In this article,the concept,advantages,and disadvantages of machine vision and the algorithm framework of machine vision in the defect detection system are briefly described,aiming to promote the rapid development of industry and strengthen China’s industry. 展开更多
关键词 Machine vision Defect detection system Image preprocessing
在线阅读 下载PDF
Enhancing Healthcare Cybersecurity through the Development and Evaluation of Intrusion Detection Systems
15
作者 Muhammad Usama Arshad Aziz +4 位作者 Imtiaz Hassan Shynar Akhmetzhanova Sultan Noman Qasem Abdullah M.Albarrak Tawfik Al-Hadhrami 《Computer Modeling in Engineering & Sciences》 2025年第7期1225-1248,共24页
The increasing reliance on digital infrastructure in modern healthcare systems has introduced significant cybersecurity challenges,particularly in safeguarding sensitive patient data and maintaining the integrity of m... The increasing reliance on digital infrastructure in modern healthcare systems has introduced significant cybersecurity challenges,particularly in safeguarding sensitive patient data and maintaining the integrity of medical services.As healthcare becomes more data-driven,cyberattacks targeting these systems continue to rise,necessitating the development of robust,domain-adapted Intrusion Detection Systems(IDS).However,current IDS solutions often lack access to domain-specific datasets that reflect realistic threat scenarios in healthcare.To address this gap,this study introduces HCKDDCUP,a synthetic dataset modeled on the widely used KDDCUP benchmark,augmented with healthcare-relevant attributes such as patient data,treatments,and diagnoses to better simulate the unique conditions of clinical environments.This research applies standard machine learning algorithms Random Forest(RF),Decision Tree(DT),and K-Nearest Neighbors(KNN)to both the KDDCUP and HCKDDCUP datasets.The methodology includes data preprocessing,feature selection,dimensionality reduction,and comparative performance evaluation.Experimental results show that the RF model performed best,achieving 98%accuracy on KDDCUP and 99%on HCKDDCUP,highlighting its effectiveness in detecting cyber intrusions within a healthcare-specific context.This work contributes a valuable resource for future research and underscores the need for IDS development tailored to sector-specific requirements. 展开更多
关键词 CYBERSECURITY KDDCUP HCKDDCUP machine learning anomaly detection data privacy
暂未订购
Intelligent sitting postural anomaly detection system for wheelchair users with unsupervised techniques
16
作者 Patrick Vermander Aitziber Mancisidor +2 位作者 Raffaele Gravina Itziar Cabanes Giancarlo Fortino 《Digital Communications and Networks》 2025年第3期622-633,共12页
Detecting sitting posture abnormalities in wheelchair users enables early identification of changes in their functional status.To date,this detection has relied on in-person observation by medical specialists.However,... Detecting sitting posture abnormalities in wheelchair users enables early identification of changes in their functional status.To date,this detection has relied on in-person observation by medical specialists.However,given the challenges faced by health specialists to carry out continuous monitoring,the development of an intelligent anomaly detection system is proposed.Unlike other authors,where they use supervised techniques,this work proposes using unsupervised techniques due to the advantages they offer.These advantages include the lack of prior labeling of data,and the detection of anomalies previously not contemplated,among others.In the present work,an individualized methodology consisting of two phases is developed:characterizing the normal sitting pattern and determining abnormal samples.An analysis has been carried out between different unsupervised techniques to study which ones are more suitable for postural diagnosis.It can be concluded,among other aspects,that the utilization of dimensionality reduction techniques leads to improved results.Moreover,the normality characterization phase is deemed necessary for enhancing the system’s learning capabilities.Additionally,employing an individualized approach to the model aids in capturing the particularities of the various pathologies present among subjects. 展开更多
关键词 Sitting posture monitoring Anomaly detection Assistive technology Pressure sensors Unsupervised techniques INDIVIDUALIZATION WHEELCHAIR
在线阅读 下载PDF
Enhanced Fire Detection System for Blind and Visually Challenged People Using Artificial Intelligence with Deep Convolutional Neural Networks
17
作者 Fahd N.Al-Wesabi Hamad Almansour +1 位作者 Huda G.Iskandar Ishfaq Yaseen 《Computers, Materials & Continua》 2025年第12期5765-5787,共23页
Earlier notification and fire detection methods provide safety information and fire prevention to blind and visually impaired(BVI)individuals in a limited timeframe in the event of emergencies,particularly in enclosed... Earlier notification and fire detection methods provide safety information and fire prevention to blind and visually impaired(BVI)individuals in a limited timeframe in the event of emergencies,particularly in enclosed areas.Fire detection becomes crucial as it directly impacts human safety and the environment.While modern technology requires precise techniques for early detection to prevent damage and loss,few research has focused on artificial intelligence(AI)-based early fire alert systems for BVI individuals in indoor settings.To prevent such fire incidents,it is crucial to identify fires accurately and promptly,and alert BVI personnel using a combination of smart glasses,deep learning(DL),and computer vision(CV).The most recent technologies require effective methods to identify fires quickly,preventing damage and physical loss.In this manuscript,an Enhanced Fire Detection System for Blind and Visually Challenged People using Artificial Intelligence with Deep Convolutional Neural Networks(EFDBVC-AIDCNN)model is presented.The EFDBVC-AIDCNN model presents an advanced fire detection system that utilizes AI to detect and classify fire hazards for BVI people effectively.Initially,image pre-processing is performed using the Gabor filter(GF)model to improve texture details and patterns specific to flames and smoke.For the feature extractor,the Swin transformer(ST)model captures fine details across multiple scales to represent fire patterns accurately.Furthermore,the Elman neural network(ENN)technique is implemented to detect fire.The improved whale optimization algorithm(IWOA)is used to efficiently tune ENN parameters,improving accuracy and robustness across varying lighting and environmental conditions to optimize performance.An extensive experimental study of the EFDBVC-AIDCNN technique is accomplished under the fire detection dataset.A short comparative analysis of the EFDBVC-AIDCNN approach portrayed a superior accuracy value of 96.60%over existing models. 展开更多
关键词 Fire detection swin transformer visually challenged people artificial intelligence computer vision image pre-processing
在线阅读 下载PDF
DEMGAN: A Machine Learning-Based Intrusion Detection System Evasion Scheme
18
作者 Dawei Xu Yue Lv +3 位作者 Min Wang Baokun Zheng Jian Zhao Jiaxuan Yu 《Computers, Materials & Continua》 2025年第7期1731-1746,共16页
Network intrusion detection systems(IDS)are a prevalent method for safeguarding network traffic against attacks.However,existing IDS primarily depend on machine learning(ML)models,which are vulnerable to evasion throu... Network intrusion detection systems(IDS)are a prevalent method for safeguarding network traffic against attacks.However,existing IDS primarily depend on machine learning(ML)models,which are vulnerable to evasion through adversarial examples.In recent years,the Wasserstein Generative Adversarial Network(WGAN),based on Wasserstein distance,has been extensively utilized to generate adversarial examples.Nevertheless,several challenges persist:(1)WGAN experiences the mode collapse problem when generating multi-category network traffic data,leading to subpar quality and insufficient diversity in the generated data;(2)Due to unstable training processes,the authenticity of the data produced by WGAN is often low.This study improves WGAN to address these issues and proposes a new adversarial sample generation algorithm called Distortion Enhanced Multi-Generator Generative Adversarial Network(DEMGAN).DEMGAN effectively evades ML-based IDS by proficiently obfuscating network traffic data samples.We assess the efficacy of our attack method against five ML-based IDS using two public datasets.The results demonstrate that our method can successfully bypass IDS,achieving average evasion rates of 97.42%and 87.51%,respectively.Furthermore,empirical findings indicate that retraining the IDS with the generated adversarial samples significantly bolsters the system’s capability to detect adversarial samples,resulting in an average recognition rate increase of 86.78%.This approach not only enhances the performance of the IDS but also strengthens the network’s resilience against potential threats,thereby optimizing network security measures. 展开更多
关键词 Adversarial attacks intrusion detection adversarial traffic examples DEMGAN
在线阅读 下载PDF
Research on multi-view collaborative detection system for UAV swarms based on Pix2Pix framework and BAM attention mechanism
19
作者 Yan Ding Qingxin Cao +2 位作者 Bozhi Zhang Peilin Li Zhongjiao Shi 《Defence Technology(防务技术)》 2025年第4期213-226,共14页
Drone swarm systems,equipped with photoelectric imaging and intelligent target perception,are essential for reconnaissance and strike missions in complex and high-risk environments.They excel in information sharing,an... Drone swarm systems,equipped with photoelectric imaging and intelligent target perception,are essential for reconnaissance and strike missions in complex and high-risk environments.They excel in information sharing,anti-jamming capabilities,and combat performance,making them critical for future warfare.However,varied perspectives in collaborative combat scenarios pose challenges to object detection,hindering traditional detection algorithms and reducing accuracy.Limited angle-prior data and sparse samples further complicate detection.This paper presents the Multi-View Collaborative Detection System,which tackles the challenges of multi-view object detection in collaborative combat scenarios.The system is designed to enhance multi-view image generation and detection algorithms,thereby improving the accuracy and efficiency of object detection across varying perspectives.First,an observation model for three-dimensional targets through line-of-sight angle transformation is constructed,and a multi-view image generation algorithm based on the Pix2Pix network is designed.For object detection,YOLOX is utilized,and a deep feature extraction network,BA-RepCSPDarknet,is developed to address challenges related to small target scale and feature extraction challenges.Additionally,a feature fusion network NS-PAFPN is developed to mitigate the issue of deep feature map information loss in UAV images.A visual attention module(BAM)is employed to manage appearance differences under varying angles,while a feature mapping module(DFM)prevents fine-grained feature loss.These advancements lead to the development of BA-YOLOX,a multi-view object detection network model suitable for drone platforms,enhancing accuracy and effectively targeting small objects. 展开更多
关键词 Drone swarm systems Reconnaissance and strike Image generation Multi-view detection Pix2Pix framework Attention mechanism
在线阅读 下载PDF
ScalaDetect-5G:Ultra High-Precision Highly Elastic Deep Intrusion Detection System for 5G Network
20
作者 Shengjia Chang Baojiang Cui Shaocong Feng 《Computer Modeling in Engineering & Sciences》 2025年第9期3805-3827,共23页
With the rapid advancement of mobile communication networks,key technologies such as Multi-access Edge Computing(MEC)and Network Function Virtualization(NFV)have enhanced the quality of service for 5G users but have a... With the rapid advancement of mobile communication networks,key technologies such as Multi-access Edge Computing(MEC)and Network Function Virtualization(NFV)have enhanced the quality of service for 5G users but have also significantly increased the complexity of network threats.Traditional static defense mechanisms are inadequate for addressing the dynamic and heterogeneous nature of modern attack vectors.To overcome these challenges,this paper presents a novel algorithmic framework,SD-5G,designed for high-precision intrusion detection in 5G environments.SD-5G adopts a three-stage architecture comprising traffic feature extraction,elastic representation,and adaptive classification.Specifically,an enhanced Concrete Autoencoder(CAE)is employed to reconstruct and compress high-dimensional network traffic features,producing compact and expressive representations suitable for large-scale 5G deployments.To further improve accuracy in ambiguous traffic classification,a Residual Convolutional Long Short-Term Memory model with an attention mechanism(ResCLA)is introduced,enabling multi-level modeling of spatial–temporal dependencies and effective detection of subtle anomalies.Extensive experiments on benchmark datasets—including 5G-NIDD,CIC-IDS2017,ToN-IoT,and BoT-IoT—demonstrate that SD-5G consistently achieves F1 scores exceeding 99.19%across diverse network environments,indicating strong generalization and real-time deployment capabilities.Overall,SD-5G achieves a balance between detection accuracy and deployment efficiency,offering a scalable,flexible,and effective solution for intrusion detection in 5G and next-generation networks. 展开更多
关键词 5G security network intrusion detection feature engineering deep learning
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部